{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:46:42Z","timestamp":1772027202609,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11125-2","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T18:02:42Z","timestamp":1626717762000},"page":"31705-31727","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["RETRACTED ARTICLE: Crypto-Stegno based model for securing medical information on IOMT platform"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2592-2824","authenticated-orcid":false,"given":"Roseline Oluwaseun","family":"Ogundokun","sequence":"first","affiliation":[]},{"given":"Joseph Bamidele","family":"Awotunde","sequence":"additional","affiliation":[]},{"given":"Emmanuel Abidemi","family":"Adeniyi","sequence":"additional","affiliation":[]},{"given":"Femi Emmanuel","family":"Ayo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,19]]},"reference":[{"issue":"11","key":"11125_CR1","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif A, Ahmed A (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11):3108","journal-title":"Sensors"},{"issue":"31\u201332","key":"11125_CR2","doi-asserted-by":"publisher","first-page":"23483","DOI":"10.1007\/s11042-020-08971-x","volume":"79","author":"OC Abikoye","year":"2020","unstructured":"Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79(31\u201332):23483\u201323506","journal-title":"Multimed Tools Appl"},{"issue":"933","key":"11125_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-981-15-9897-5_6","volume":"2021","author":"EA Adeniyi","year":"2021","unstructured":"Adeniyi EA, Ogundokun RO, Awotunde JB (2021) IoMT-based wearable body sensors network healthcare monitoring system. Stud Computational Intell 2021(933):103\u2013121","journal-title":"Stud Computational Intell"},{"key":"11125_CR4","doi-asserted-by":"crossref","unstructured":"Akande NO, Abikoye CO, Adebiyi MO, Kayode AA, Adegun AA, Ogundokun RO (2019) Electronic medical information encryption using modified blowfish algorithm. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 11623 LNCS, pp. 166-179","DOI":"10.1007\/978-3-030-24308-1_14"},{"key":"11125_CR5","doi-asserted-by":"crossref","unstructured":"Akande ON, Abikoye OC, Kayode AA, Aro OT, Ogundokun OR (2020) A dynamic round triple data encryption standard cryptographic technique for data security. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 12254 LNCS, pp. 487-499","DOI":"10.1007\/978-3-030-58817-5_36"},{"issue":"12","key":"11125_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.3390\/fi10120114","volume":"10","author":"S Ali","year":"2018","unstructured":"Ali S, Islam N, Rauf A, Din IU, Guizani M, Rodrigues JJ (2018) Privacy and security issues in online social networks. Future Internet 10(12):114","journal-title":"Future Internet"},{"issue":"23","key":"11125_CR7","doi-asserted-by":"publisher","first-page":"31487","DOI":"10.1007\/s11042-018-6213-0","volume":"77","author":"AH Ali","year":"2018","unstructured":"Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77(23):31487\u201331516","journal-title":"Multimed Tools Appl"},{"key":"11125_CR8","doi-asserted-by":"publisher","unstructured":"Alsubaei F, Abuhussein A, Shiva S (2017) Security and privacy in the internet of medical things: taxonomy and risk assessment. In 2017 IEEE 42nd conference on local computer networks workshops (LCN workshops), pp. 112\u2013120. IEEE, Singapore. https:\/\/doi.org\/10.1109\/LCN.Workshops.2017.72","DOI":"10.1109\/LCN.Workshops.2017.72"},{"issue":"1","key":"11125_CR9","doi-asserted-by":"publisher","first-page":"1513349","DOI":"10.1080\/2331205X.2018.1513349","volume":"5","author":"M Anandarajan","year":"2018","unstructured":"Anandarajan M, Malik S (2018) Protecting the internet of medical things: a situational crime-prevention approach. Cogent Medicine 5(1):1513349","journal-title":"Cogent Medicine"},{"key":"11125_CR10","doi-asserted-by":"publisher","first-page":"62095","DOI":"10.1109\/ACCESS.2019.2916340","volume":"7","author":"KA Awan","year":"2019","unstructured":"Awan KA, Din IU, Almogren A, Guizani M, Altameem A, Jadoon SU (2019) Robusttrust\u2013a pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7:62095\u201362106","journal-title":"IEEE Access"},{"key":"11125_CR11","doi-asserted-by":"crossref","unstructured":"Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection is based on deep learning model optimized with rule-based hybrid feature selection. Information Security Journal: A Global Perspective, 1\u201317","DOI":"10.1080\/19393555.2020.1767240"},{"key":"11125_CR12","first-page":"943","volume":"17","author":"J Biglow","year":"2016","unstructured":"Biglow J (2016) It stands to reason: an argument for article III standing based on the threat of future harm in data breach litigation. Minn JL Sci & Tech 17:943","journal-title":"Minn JL Sci & Tech"},{"key":"11125_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1\u201331","journal-title":"Comput Commun"},{"issue":"1","key":"11125_CR14","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2013","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Systems 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distrib Systems"},{"key":"11125_CR15","doi-asserted-by":"crossref","unstructured":"Christiana AO, Oluwatobi AN, Victory GA, Oluwaseun OR (2019) A secured one time password authentication technique using (3, 3) visual cryptography scheme. In journal of physics: conference series (Vol. 1299, no. 1, p. 012059). IOP publishing","DOI":"10.1088\/1742-6596\/1299\/1\/012059"},{"key":"11125_CR16","unstructured":"Crandall R (1988) Some notes on steganography. Posted on steganography mailing list (1998). Source: http:\/\/www. Dia. Unisa. It\/~ ads\/corso security\/www\/CORSO-0203\/steganografia\/LINKS% 20LOCALI\/matrixencoding. Pdf"},{"key":"11125_CR17","unstructured":"D'agapeyeff A (2016) Codes and ciphers-a history of cryptography. Read books ltd. technologies (INTELLECT) (pp. 1-7). IEEE"},{"key":"11125_CR18","doi-asserted-by":"publisher","first-page":"29763","DOI":"10.1109\/ACCESS.2018.2880838","volume":"7","author":"IU Din","year":"2018","unstructured":"Din IU, Guizani M, Kim BS, Hassan S, Khan MK (2018) Trust management techniques for the internet of things: a survey. IEEE Access 7:29763\u201329787","journal-title":"IEEE Access"},{"key":"11125_CR19","doi-asserted-by":"publisher","first-page":"89967","DOI":"10.1109\/ACCESS.2019.2927082","volume":"7","author":"IU Din","year":"2019","unstructured":"Din IU, Almogren A, Guizani M, Zuair M (2019) A decade of internet of things: analysis in the light of healthcare applications. IEEE Access 7:89967\u201389979","journal-title":"IEEE Access"},{"key":"11125_CR20","doi-asserted-by":"crossref","unstructured":"Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2020) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput Applic, 32(15), 10979\u201310993","DOI":"10.1007\/s00521-018-3801-x"},{"key":"11125_CR21","doi-asserted-by":"crossref","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure 765 medical data transmission model for IoT-based healthcare systems. Ieee Access 6:20596\u201320608","DOI":"10.1109\/ACCESS.2018.2817615"},{"key":"11125_CR22","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.future.2017.04.036","volume":"78","author":"B Farahani","year":"2018","unstructured":"Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2018) Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare. Futur Gener Comput Syst 78:659\u2013676","journal-title":"Futur Gener Comput Syst"},{"key":"11125_CR23","unstructured":"Filkins B (2019) Health Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on Horizon. North Bethesda, SANS Institute, 2014"},{"key":"11125_CR24","first-page":"47","volume":"41","author":"C Goforth","year":"2019","unstructured":"Goforth C (2019) The Lawyer's Cryptionary: a resource for talking to clients about crypto-transactions. Campbell L Rev 41:47","journal-title":"Campbell L Rev"},{"issue":"1","key":"11125_CR25","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2008.16","volume":"7","author":"D Halperin","year":"2008","unstructured":"Halperin D, Heydt-Benjamin TS, Fu K, Kohno T, Maisel WH (2008) Security and privacy for implantable medical devices. IEEE Pervasive Comput 7(1):30\u201339","journal-title":"IEEE Pervasive Comput"},{"key":"11125_CR26","doi-asserted-by":"crossref","unstructured":"He Y, Xian H, Wang L, Zhang S (2020) Secure encrypted data deduplication based on data popularity. Mobile networks and applications, 1-10","DOI":"10.1007\/s11036-019-01504-3"},{"issue":"6","key":"11125_CR27","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1093\/jcr\/ucx105","volume":"44","author":"DL Hoffman","year":"2018","unstructured":"Hoffman DL, Novak TP (2018) Consumer and object experience in the internet of things: an assemblage theory approach. J Consum Res 44(6):1178\u20131204","journal-title":"J Consum Res"},{"key":"11125_CR28","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)\u2013enabled framework for health monitoring. Comput Netw 101:192\u2013202","journal-title":"Comput Netw"},{"key":"11125_CR29","doi-asserted-by":"crossref","unstructured":"Huang M, Liu A, Wang T, Huang C (2018) Green data gathering under delay differentiated services constraint for internet of things Wireless Communications and Mobile Computing, 2018","DOI":"10.1155\/2018\/9715428"},{"key":"11125_CR30","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"key":"11125_CR31","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SR Islam","year":"2015","unstructured":"Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678\u2013708","journal-title":"IEEE Access"},{"key":"11125_CR32","doi-asserted-by":"publisher","first-page":"106814","DOI":"10.1016\/j.measurement.2019.07.042","volume":"147","author":"SU Islam","year":"2019","unstructured":"Islam SU, Khattak HA, Pierson JM, Din IU, Almogren A, Guizani M, Zuair M (2019) Leveraging utilization as performance metric for CDN enabled energy efficient internet of things. Measurement 147:106814","journal-title":"Measurement"},{"issue":"1","key":"11125_CR33","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s13755-018-0049-x","volume":"6","author":"V Jagadeeswari","year":"2018","unstructured":"Jagadeeswari V, Subramaniyaswamy V, Logesh R, Vijayakumar VJHIS (2018) A study on medical internet of things and big data in personalized healthcare system. Health Inform Sci Syst 6(1):14","journal-title":"Health Inform Sci Syst"},{"key":"11125_CR34","doi-asserted-by":"crossref","unstructured":"Kapusta K, Qiu H, Memmi G (2019) Secure data sharing with fast access revocation through untrusted clouds. In 2019 10th IFIP international conference on new technologies, mobility and security (NTMS) (pp. 1-5). IEEE","DOI":"10.1109\/NTMS.2019.8763850"},{"issue":"1","key":"11125_CR35","first-page":"7","volume":"6","author":"A Kazeem Moses","year":"2021","unstructured":"Kazeem Moses A, Joseph Bamidele A, Roseline Oluwaseun O, Misra S, Abidemi Emmanuel A (2021) Applicability of MMRR load balancing algorithm in cloud computing. Int J Comput Mathematics: Comput Syst Theory 6(1):7\u201320","journal-title":"Int J Comput Mathematics: Comput Syst Theory"},{"issue":"4","key":"11125_CR36","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s11277-018-5336-y","volume":"99","author":"M Khan","year":"2018","unstructured":"Khan M, Han K, Karthik SJWPC (2018) Designing smart control systems based on internet of things and big data analytics. Wirel Pers Commun 99(4):1683\u20131697","journal-title":"Wirel Pers Commun"},{"key":"11125_CR37","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.future.2019.01.033","volume":"98","author":"SU Khan","year":"2019","unstructured":"Khan SU, Islam N, Jan Z, Din IU, Khan A, Faheem Y (2019) An e-health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application. Futur Gener Comput Syst 98:286\u2013296","journal-title":"Futur Gener Comput Syst"},{"key":"11125_CR38","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.future.2020.03.054","volume":"109","author":"SR Khan","year":"2020","unstructured":"Khan SR, Sikandar M, Almogren A, Din IU, Fortino G, Guerrieri A (2020) IoMT-based computational approach for detecting brain tumor. Futur Gener Comput Syst 109:360\u2013367","journal-title":"Futur Gener Comput Syst"},{"key":"11125_CR39","doi-asserted-by":"crossref","unstructured":"Khan S, Abbas N, Nasir M, Haseeb K, Saba T, Rehman A, Mehmood Z (2020) Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multimedia tools and applications, 1-21.","DOI":"10.1007\/s11042-020-09652-5"},{"issue":"1","key":"11125_CR40","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","volume":"50","author":"M Khari","year":"2019","unstructured":"Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2019) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybernetics: Syst 50(1):73\u201380","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"issue":"6","key":"11125_CR41","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/TII.2015.2434773","volume":"11","author":"J Kim","year":"2015","unstructured":"Kim J (2015) Energy-efficient dynamic packet downloading for medical IoT platforms. IEEE Trans Indust Inform 11(6):1653\u20131659","journal-title":"IEEE Trans Indust Inform"},{"issue":"1","key":"11125_CR42","first-page":"14","volume":"11","author":"KA Kingsley","year":"2020","unstructured":"Kingsley KA, Barmawi AM (2020) Improving data hiding capacity in code based steganography using multiple embedding. J Inform Hiding Multimedia Signal Process 11(1):14\u201343","journal-title":"J Inform Hiding Multimedia Signal Process"},{"key":"11125_CR43","unstructured":"Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. In proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT) (pp. 26-27)"},{"key":"11125_CR44","doi-asserted-by":"publisher","first-page":"24196","DOI":"10.1109\/ACCESS.2018.2830651","volume":"6","author":"SK Lakshmanaprabu","year":"2018","unstructured":"Lakshmanaprabu SK, Shankar K, Khanna A, Gupta D, Rodrigues JJ, Pinheiro PR, De Albuquerque VHC (2018) Effective features to classify big data using social internet of things. IEEE access 6:24196\u201324204","journal-title":"IEEE access"},{"key":"11125_CR45","doi-asserted-by":"publisher","first-page":"12845","DOI":"10.1109\/ACCESS.2020.2964830","volume":"8","author":"T Li","year":"2020","unstructured":"Li T, Li H, Hu L, Li H (2020) A reversible steganography method with statistical features maintained based on the difference value. IEEE Access 8:12845\u201312855","journal-title":"IEEE Access"},{"key":"11125_CR46","doi-asserted-by":"publisher","first-page":"31950","DOI":"10.1109\/ACCESS.2018.2845399","volume":"6","author":"MM Mahmoud","year":"2018","unstructured":"Mahmoud MM, Rodrigues JJ, Ahmed SH, Shah SC, Al-Muhtadi JF, Korotaev VV, De Albuquerque VHC (2018) Enabling technologies on cloud of things for smart healthcare. IEEE Access 6:31950\u201331967","journal-title":"IEEE Access"},{"key":"11125_CR47","unstructured":"Mishra TK, Arvind N Design and Implementation of Text Cryptography for Multi-Languages and Resolving Type Cast Issues"},{"issue":"1","key":"11125_CR48","first-page":"53","volume":"49","author":"AM Molaei","year":"2017","unstructured":"Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2017) Steganography scheme based on reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electric Eng 49(1):53\u201362","journal-title":"AUT J Electric Eng"},{"key":"11125_CR49","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.future.2016.02.020","volume":"64","author":"SR Moosavi","year":"2016","unstructured":"Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Futur Gener Comput Syst 64:108\u2013124","journal-title":"Futur Gener Comput Syst"},{"key":"11125_CR50","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.future.2018.07.049","volume":"90","author":"AA Mutlag","year":"2019","unstructured":"Mutlag AA, Ghani MKA, Arunkumar NA, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Futur Gener Comput Syst 90:62\u201378","journal-title":"Futur Gener Comput Syst"},{"key":"11125_CR51","unstructured":"Nanayakkara N, Halgamuge M, Syed A (2019) Security and privacy of internet of medical things (IoMT) based healthcare applications: a review"},{"issue":"3","key":"11125_CR52","first-page":"126","volume":"11","author":"HA Nassrullah","year":"2020","unstructured":"Nassrullah HA, Flayyih WN, Nasrullah MA (2020) Enhancement of LSB audio steganography based on carrier and message characteristics. J Inform Hiding Multimed Signal Process 11(3):126\u2013137","journal-title":"J Inform Hiding Multimed Signal Process"},{"key":"11125_CR53","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-030-63396-7_37","volume":"402","author":"RO Ogundokun","year":"2020","unstructured":"Ogundokun RO, Abikoye OC, Misra S, Awotunde JB (2020) Modified least significant bit technique for securing medical images. Lect Notes Business Inform Processing 402:553\u2013565","journal-title":"Lect Notes Business Inform Processing"},{"key":"11125_CR54","first-page":"181","volume-title":"In recent trends in image and signal processing in computer vision","author":"S Rajendran","year":"2020","unstructured":"Rajendran S, Kulkarni V, Chaudhari S, Gupta PK (2020) An update on medical data steganography and encryption. In: In recent trends in image and signal processing in computer vision. Springer, Singapore, pp 181\u2013199"},{"key":"11125_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.07.012","volume":"94","author":"P Rawat","year":"2016","unstructured":"Rawat P, Singh KD, Bonnin JM (2016) Cognitive radio for M2M and internet of things: a survey. Comput Commun 94:1\u201329","journal-title":"Comput Commun"},{"key":"11125_CR56","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1049\/iet-its.2019.0855","volume":"14","author":"M Sara\u010devi\u0107","year":"2020","unstructured":"Sara\u010devi\u0107 M, Adamovi\u0107 S, Ma\u010dek N, Elhoseny M, Sarhan S (2020) Cryptographic keys exchange model for smart city applications. IET Intell Transp Syst 14:1456\u20131464","journal-title":"IET Intell Transp Syst"},{"key":"11125_CR57","unstructured":"Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. john Wiley & sons"},{"issue":"4","key":"11125_CR58","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1080\/19361610.2017.1354275","volume":"12","author":"JH Schuessler","year":"2017","unstructured":"Schuessler JH, Nagy D, Fulk HK, Dearing A (2017) Data breach Laws: do they work? J Appl Secur Res 12(4):512\u2013524","journal-title":"J Appl Secur Res"},{"issue":"2","key":"11125_CR59","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/CC.2017.7868160","volume":"14","author":"K Shankar","year":"2017","unstructured":"Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118\u2013130","journal-title":"China Commun"},{"issue":"5","key":"11125_CR60","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s12046-019-1106-0","volume":"44","author":"R Shanthakumari","year":"2019","unstructured":"Shanthakumari R, Malliga S (2019) Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment. S\u0101dhan\u0101 44(5):119","journal-title":"S\u0101dhan\u0101"},{"key":"11125_CR61","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1108\/IntR-07-2016-0200","volume":"27","author":"D Shin","year":"2017","unstructured":"Shin D, Hwang Y (2017) Integrated acceptance and sustainability evaluation of internet of medical things. Internet Res 27:1227\u20131254","journal-title":"Internet Res"},{"key":"11125_CR62","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"11125_CR63","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95\u2013113","journal-title":"Comput Sci Rev"},{"key":"11125_CR64","doi-asserted-by":"crossref","unstructured":"Sun W, Cai Z, Liu F, Fang S, Wang G (2017) A survey of data mining technology on electronic medical records. In 2017 IEEE 19th international conference on e-health networking, applications and services (Healthcom) (pp. 1-6). IEEE","DOI":"10.1109\/HealthCom.2017.8210774"},{"key":"11125_CR65","first-page":"1","volume":"2018","author":"W Sun","year":"2018","unstructured":"Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and privacy in the medical internet of things: a review. Secur Commun Networks 2018:1\u20139","journal-title":"Secur Commun Networks"},{"key":"11125_CR66","doi-asserted-by":"crossref","unstructured":"Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In IOP conference series: materials science and engineering (Vol. 518, no. 5, p. 052003). IOP publishing","DOI":"10.1088\/1757-899X\/518\/5\/052003"},{"issue":"5","key":"11125_CR67","doi-asserted-by":"crossref","first-page":"155014771985197","DOI":"10.1177\/1550147719851977","volume":"15","author":"S Tahir","year":"2019","unstructured":"Tahir S, Bakhsh ST, Abulkhair M, Alassafi MO (2019) An energy-efficient fog-to-cloud internet of medical things architecture. Int J Distribut Sens Networks 15(5):1550147719851977","journal-title":"Int J Distribut Sens Networks"},{"issue":"6","key":"11125_CR68","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"CC Tan","year":"2009","unstructured":"Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926\u2013932","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"11125_CR69","doi-asserted-by":"crossref","unstructured":"Tang J, Liu A, Zhao M, Wang T (2018) An aggregate signature based trust routing for data gathering in sensor networks Security and Communication Networks, 2018","DOI":"10.1155\/2018\/6328504"},{"key":"11125_CR70","unstructured":"Van Oorschot PC, Menezes AJ, Vanstone SA (1996) Handbook of applied cryptography. Crc Press"},{"key":"11125_CR71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03187-8","volume-title":"Innovations in digital watermarking techniques (pp. 11\u201326)","author":"FH Wang","year":"2009","unstructured":"Wang FH, Pan JS, Jain LC (2009) Digital watermarking techniques. In: Innovations in digital watermarking techniques (pp. 11\u201326). Springer, Berlin"},{"key":"11125_CR72","doi-asserted-by":"crossref","unstructured":"Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical devices (Auckland, NZ), 8, 305.","DOI":"10.2147\/MDER.S50048"},{"key":"11125_CR73","unstructured":"Wood A, Virone G, Doan T, Cao Q, Selavo L, Wu Y, ... Stankovic J (2006) ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. University of Virginia Computer Science Department Technical Report, 2, 17"},{"issue":"5","key":"11125_CR74","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250\u20131258","journal-title":"IEEE Internet Things J"},{"key":"11125_CR75","doi-asserted-by":"crossref","unstructured":"Yaqoob I, Ahmed E, Ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444\u2013458","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"11125_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6803801","volume":"2019","author":"M Yin","year":"2019","unstructured":"Yin M, Chen X, Wang Q, Wang W, Wang Y (2019) Dynamics on hybrid complex network: botnet modeling and analysis of medical IoT. Secur Commun Networks 2019:1\u201314","journal-title":"Secur Commun Networks"}],"updated-by":[{"DOI":"10.1007\/s11042-024-19933-y","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11125-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11125-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11125-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T13:23:45Z","timestamp":1722259425000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11125-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,19]]},"references-count":76,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11125"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11125-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,19]]},"assertion":[{"value":"12 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-19933-y","URL":"https:\/\/doi.org\/10.1007\/s11042-024-19933-y","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}